Enables organizations to address the business requirements of line-of-business and compliance managers, and auditors to achieve successful implementation
Full enterprise-level identity management and governance
IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.
User lifecycle management |
Business activity-based approach |
Complete user access control |
Enable full provisioning and workflow capabilities, leveraging open integration to quickly onboard, manage and simplify Identity Management. | Facilitate communication between auditors and IT to help identify risk and highlight segregation of duties violations across enterprise applications including SAP and cloud applications. | Gain better visibility and user access control through consolidating access entitlements from applications and employing algorithms for role mining, modeling, optimization and analytics to lower risk. |
Features of Security Identity Governance and Intelligence
|
|
How Security Identity Governance and Intelligence works |
|
Enable certification campaigns IGI enables the business to run campaigns to reconfirm users access needs with a customizable, self-service user dashboard. This simple experience quickly provides flexible and powerful workflow allowing users to easily recertify access. |
Consolidate application access entitlements IGI offers a rich set of mature and compatible application adapters, both on prem and for the cloud. This allows for better visibility and user access control for role mining, modeling and optimization. |
Determine segregation of duties violations IGI uses a business activity-based approach to model segregation of duties violations rather than relying on role-to-role comparison. Business activity is immediately recognizable to the business user and enables a very pure and clear way of showing risk that is understood and actionable. By showing a conflict between business activities, such as “create purchase order” and “approve purchase order,” it is much more obvious to the user than a role-to-role defined conflict. |
Provide end-to-end user lifecycle management IGI provides ease of use through lifecycle management capabilities including powerful workflow provisioning and integrated password management. IGI allows sharing of data about users, applications and entitlements. |